
【雲智維資安預警通知】
- 漏洞分享 - Fortinet 產品多個漏洞
Fortinet 產品存在多個漏洞,允許遠端攻擊者利用這些漏洞,於目標系統觸發權限提升、遠端執行任意程式碼、洩露敏感資料、繞過身份驗證、阻斷服務、篡改及仿冒,其影響系統或版本如下:
- 受影響之系統/漏洞描述:
- Use of uninitialized resource in SSLVPN websocket
CVE編號: CVE-2023-37930
漏洞描述:在 FortiOS 和 FortiProxy 的 SSLVPN 網頁模式(webmode)中,存在多項潛在問題,包括使用未初始化的資源(CWE-908)以及過度迴圈執行。
影響系統/版本:
FortiOS version 7.4.0
FortiOS version 7.2.0 through 7.2.5
FortiOS version 7.0.1 through 7.0.12
FortiOS version 6.4.7 through 6.4.14
FortiProxy version 7.2.0 through 7.2.6
FortiProxy version 7.0.0 through 7.0.12
- OS command injection on gen-ca-cert command
CVE編號:CVE-2024-54025
漏洞描述:FortiIsolator 的 CLI 中存在一項作業系統指令注入(OS Command Injection)漏洞 ,該漏洞因未正確中和用於作業系統指令中的特殊元素,可能使具備權限的攻擊者透過精心構造的 CLI 請求執行未授權的程式碼或指令。
影響系統/版本:
FortiIsolator version 2.4.3 through 2.4.6
- Unverified password change via set_password endpoint
CVE編號:CVE-2024-48887
漏洞描述:FortiSwitch 的圖形化管理介面(GUI)中存在一項未驗證密碼變更漏洞,該漏洞可能使遠端未經驗證的攻擊者透過特別構造的請求修改管理員密碼。
影響系統/版本:
FortiOS version 7.4.0 through 7.4.4
FortiOS version 7.2.0 through 7.2.8
FortiOS version 7.0.0 through 7.0.10
FortiOS version 6.4.0 through 6.4.14
- No certificate name verification for fgfm connection
CVE編號:CVE-2024-26013、CVE-2024-50565
漏洞描述:FortiOS、FortiProxy、FortiManager、FortiAnalyzer、FortiVoice 以及 FortiWeb 中存在一項對通訊通道未正確限制至預期端點的漏洞 ,該漏洞可能使位於中間人(Man-in-the-Middle)位置的未驗證攻擊者,藉由攔截管理設備與被管理設備之間的 FGFM 驗證請求,偽裝成管理設備(如 FortiCloud 伺服器,或在特定條件下為 FortiManager)。
影響系統/版本:
FortiAnalyzer version 7.4.0 through 7.4.2
FortiAnalyzer version 7.2.0 through 7.2.4
FortiAnalyzer version 7.0.0 through 7.0.11
FortiAnalyzer version 6.4.0 through 6.4.14
FortiAnalyzer version 6.2.0 through 6.2.13
FortiManager version 7.4.0 through 7.4.2
FortiManager version 7.2.0 through 7.2.4
FortiManager version 7.0.0 through 7.0.11
FortiManager version 6.4.0 through 6.4.14
FortiManager version 6.2.0 through 6.2.13
FortiOS version 7.4.0 through 7.4.4
FortiOS version 7.2.0 through 7.2.8
FortiOS version 7.0.0 through 7.0.15
FortiOS 6.4 all versions
FortiOS version 6.2.0 through 6.2.16
FortiProxy version 7.4.0 through 7.4.2
FortiProxy version 7.2.0 through 7.2.9
FortiProxy version 7.0.0 through 7.0.15
FortiProxy 2.0 all versions
FortiVoice version 7.0.0 through 7.0.2
FortiVoice version 6.4.0 through 6.4.8
FortiVoice 6.0 all versions
FortiWeb version 7.4.0 through 7.4.2
FortiWeb 7.2 all versions
FortiWeb 7.0 all versions
- OS command injection on diagnose feature (GUI)
CVE編號:CVE-2024-54024
漏洞描述:FortiIsolator 中存在一項作業系統指令注入(OS Command Injection)漏洞,該漏洞因未正確中和用於作業系統指令中的特殊元素,可能使具備超級管理員(super-admin)權限且可存取 CLI 的攻擊者,透過特別構造的 HTTP 請求執行未授權的程式碼。
影響系統/版本:
FortiIsolator 2.4 version 2.4.3 through 2.4.6
- Log Pollution via login page
CVE編號:CVE-2024-52962
漏洞描述:FortiManager 與 FortiAnalyzer 中存在一項日誌輸出未正確中和的漏洞,該漏洞可能使未驗證的遠端攻擊者透過特別構造的登入請求汙染日誌內容。
影響系統/版本:
FortiAnalyzer version 7.6.0 through 7.6.1
FortiAnalyzer version 7.4.0 through 7.4.5
FortiAnalyzer version 7.2.0 through 7.2.8
FortiAnalyzer version 7.0.0 through 7.0.13
FortiManager version 7.6.0 through 7.6.1
FortiManager version 7.4.0 through 7.4.5
FortiManager version 7.2.0 through 7.2.8
FortiManager version 7.0.0 through 7.0.13
- LDAP Clear-text credentials retrievable with IP modification
CVE編號:CVE-2024-32122
漏洞描述:FortiOS 中存在一項憑證保護不足的漏洞,該漏洞可能使具備權限的已驗證攻擊者,透過修改 FortiOS 設定中的 LDAP 伺服器 IP 位址,將其指向由攻擊者控制的惡意伺服器,以此方式取得 LDAP 憑證資訊。
影響系統/版本:
FortiOS 7.4 all versions
FortiOS 7.2 all versions
FortiOS 7.0 all versions
FortiOS 6.4 all versions
- Incorrect user management in widgets dashboard
CVE編號:CVE-2024-46671
漏洞描述:FortiWeb 的 widgets 儀表板中存在一項使用者管理不當的漏洞,該漏洞可能使具備至少唯讀管理權限的已驗證攻擊者,透過特別構造的請求,對其他管理員的儀表板執行操作。。
影響系統/版本:
FortiWeb version 7.6.0 through 7.6.2
FortiWeb version 7.4.0 through 7.4.6
FortiWeb version 7.2.0 through 7.2.10
FortiWeb 7.0 all versions
- EMS can send javascript code to client through messages
CVE編號:CVE-2025-22855
漏洞描述:FortiClient 中存在一項網頁產生過程中輸入未正確中和的漏洞(跨站腳本攻擊,Cross-site Scripting),該漏洞可能使 EMS 管理員 能夠傳送包含 JavaScript 程式碼的訊息。
影響系統/版本:
FortiClientEMS version 7.4.0 through 7.4.1
FortiClientEMS version 7.2.1 through 7.2.9
- Directory Traversal
CVE編號:CVE-2025-25254
漏洞描述:FortiWeb 端點中存在一項對路徑名稱限制不當的漏洞(路徑穿越,Path Traversal),該漏洞可能使已驗證的管理員透過特別構造的請求,存取並修改檔案系統中的資料。
影響系統/版本:
FortiWeb version 7.6.0 through 7.6.2
FortiWeb version 7.4.0 through 7.4.6
FortiWeb 7.2 all versions
FortiWeb 7.0 all versions
- 建議改善措施:
企業及使用者如有上述漏洞版本應儘速更新:
漏洞:Use of uninitialized resource in SSLVPN websocket
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-23-165
漏洞:OS command injection on gen-ca-cert command
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-392
漏洞:Unverified password change via set_password endpoint
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-435
漏洞:No certificate name verification for fgfm connection
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-046
漏洞:OS command injection on diagnose feature (GUI)
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-397
漏洞:Log Pollution via login page
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-453
漏洞:LDAP Clear-text credentials retrievable with IP modification
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-111
漏洞:Incorrect user management in widgets dashboard
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-184
漏洞:EMS can send javascript code to client through messages
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-23-344
漏洞:Directory Traversal
更新資訊:https://fortiguard.fortinet.com/psirt/FG-IR-24-474
情資報告連結:https://fortiguard.fortinet.com/psirt/FG-IR-23-165
https://fortiguard.fortinet.com/psirt/FG-IR-24-392
https://fortiguard.fortinet.com/psirt/FG-IR-24-435
https://fortiguard.fortinet.com/psirt/FG-IR-24-046
https://fortiguard.fortinet.com/psirt/FG-IR-24-397
https://fortiguard.fortinet.com/psirt/FG-IR-24-453
https://fortiguard.fortinet.com/psirt/FG-IR-24-111
https://fortiguard.fortinet.com/psirt/FG-IR-24-184
https://fortiguard.fortinet.com/psirt/FG-IR-23-344
https://fortiguard.fortinet.com/psirt/FG-IR-24-474